Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp2256887yba; Thu, 25 Apr 2019 13:16:47 -0700 (PDT) X-Google-Smtp-Source: APXvYqwG6dmfmGwp7w31p0IzXhv+QPJ1IvLiwqK21cm7ggSxXslHNjASYRCl3PnCftrxN/AgJb+5 X-Received: by 2002:a17:902:505:: with SMTP id 5mr28664073plf.323.1556223406954; Thu, 25 Apr 2019 13:16:46 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1556223406; cv=none; d=google.com; s=arc-20160816; b=rrYtz9SyMPvdKpyfaSAYqqUeRx3E61SlhGMMYHHD9HjK5VFIcJW/6yx+YKXwXcdews aV93vJeoS3oikhYI/jYC0Y36bzHanGK++RxEmjX6c3fwfrXMoOg9RiFcagRuApPZAM4u eRkprqdtaXejDtTxJW719zIldh6cIh15IubCxWrsxeTH65JL3OnBMJWZORrmYb1+ptiE 6vKlEIZOov9Lk5XA/8j01e3xfPOIt6i9dT+gd2qA/EdhDbniUF7cMeCS7jlB0ES/7Lt/ BqHzDx30tQfGkMwPAlPLbbZQJD3orgqdUyHqtXZqfrWLy2SoRNiJvCLIx44yUDlGTUzr ZZWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:user-agent:in-reply-to :content-disposition:mime-version:references:message-id:subject:cc :to:from:date; bh=eCQCTILsHwKAa8Sv7CFOufLoIWJCTSdROKz7rOPno9w=; b=InNuAU3G+aeIQSVmGOI3IcTYNgrslvAUKz3HzYbIT4rE+QMMcQUynrV64+zE7Qf/1L 0u6SQboZpb/yLaPERZpO8fKEEuNialTQyI0mVePuoxyffu1Ev/NhtDTLC21U4SNBn/+p 7+RTen3dVjr9a++ArCvB7z2eYIXGeVO1QQMgrclHCFV3bzdjQfi8nDpqaca0UNYlz1Ye qwxwtJK2Tcc+w2xbjPSFqSndgAEkAx5BmAVMspfNz7pQ6O1QZVgaZ1HddHYYOrqVMBp2 avj60WW/iTQE4pN+mHreUul6iMoNOAlPXzpC9Zg493eokS8+TV5zVWd2ZAQ2a3iRazV1 Ar5Q== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id d10si13229480pgu.150.2019.04.25.13.16.31; Thu, 25 Apr 2019 13:16:46 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-nfs-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-nfs-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730758AbfDYUQ1 (ORCPT + 99 others); Thu, 25 Apr 2019 16:16:27 -0400 Received: from fieldses.org ([173.255.197.46]:51532 "EHLO fieldses.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726125AbfDYUQ1 (ORCPT ); Thu, 25 Apr 2019 16:16:27 -0400 Received: by fieldses.org (Postfix, from userid 2815) id 9D3276D9; Thu, 25 Apr 2019 16:16:26 -0400 (EDT) Date: Thu, 25 Apr 2019 16:16:26 -0400 From: "bfields@fieldses.org" To: Trond Myklebust Cc: "linux-nfs@vger.kernel.org" , "Anna.Schumaker@netapp.com" Subject: Re: [PATCH 6/9] NFSv4: Convert the NFS client idmapper to use the container user namespace Message-ID: <20190425201626.GC9889@fieldses.org> References: <20190424214650.4658-4-trond.myklebust@hammerspace.com> <20190424214650.4658-5-trond.myklebust@hammerspace.com> <20190424214650.4658-6-trond.myklebust@hammerspace.com> <20190424214650.4658-7-trond.myklebust@hammerspace.com> <20190425143243.GA8133@fieldses.org> <20190425153339.GB8133@fieldses.org> <20190425164500.GA9015@fieldses.org> <67d3d9af243a0c4efa37c08532f5c0f5157bdb91.camel@hammerspace.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <67d3d9af243a0c4efa37c08532f5c0f5157bdb91.camel@hammerspace.com> User-Agent: Mutt/1.5.21 (2010-09-15) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org On Thu, Apr 25, 2019 at 04:48:54PM +0000, Trond Myklebust wrote: > On Thu, 2019-04-25 at 12:45 -0400, bfields@fieldses.org wrote: > > On Thu, Apr 25, 2019 at 04:40:18PM +0000, Trond Myklebust wrote: > > > On Thu, 2019-04-25 at 11:33 -0400, bfields@fieldses.org wrote: > > > > On Thu, Apr 25, 2019 at 03:00:22PM +0000, Trond Myklebust wrote: > > > > > The assumption is that if you have enough privileges to mount a > > > > > filesystem using the NFS client, then you would also have > > > > > enough > > > > > privileges to run a userspace client, so there is little point > > > > > in > > > > > restricting the NFS client. > > > > > > > > > > So the guiding principle is that a NFS client mount that is > > > > > started > > > > > in > > > > > a container should behave as if it were started by a process in > > > > > a > > > > > "real > > > > > VM". That means that the root uid/gid in the container maps to > > > > > a > > > > > root > > > > > uid/gid on the wire. > > > > > Ditto, if there is a need to run the idmapper in the container, > > > > > then > > > > > the expectation is that processes running as 'user' with uid > > > > > 'u', > > > > > will > > > > > see their creds mapped correctly by the idmapper. Again, that's > > > > > what > > > > > you would see if the process were running in a VM instead of a > > > > > container. > > > > > > > > > > Does that all make sense? > > > > > > > > Yes, thanks! > > > > > > > > I thought there was a problem that the idmapper depended on > > > > keyring usermodehelper calls that it was hard to pass namespace > > > > information to. Did that get fixed and I missed it or or forgot? > > > > > > No, you are correct, and so we assume the container is using > > > rpc.idmapd > > > (and rpc.gssd) if it is running NFSv4 with RPCSEC_GSS. > > > > > > If the keyring upcall gets fixed, then we may allow it to be used > > > in > > > future kernels. > > > > OK, got it. Is there anything we lose by using > > idmapd? (IDMAP_NAMESZ > > might be a limitation?) > > IDMAP_NAMESZ should be set to 128 by default, so should work for most > cases. I don't think there are any further limitations. Makes sense. Looks good to me! --b.